Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
100 commits
Select commit Hold shift + click to select a range
9eafc6e
Merge pull request #1 from kubernetes-sigs/master
snehala27 Apr 22, 2020
98bd6fb
Merge pull request #2 from kubernetes-sigs/master
snehala27 Apr 30, 2020
b49474d
Merge remote-tracking branch 'upstream/master'
sadysnaat Dec 9, 2020
87e40e4
Merge branch 'kubernetes-sigs:main' into master
snehala27 Jun 21, 2022
91fa555
Added spectro manifests
snehala27 Jul 1, 2022
2cadf39
logic to separate webhook and controller as separate pods
snehala27 Jul 1, 2022
b7a0d1b
fix for BET-3719
snehala27 Jul 4, 2022
e9fa246
fix for BET-3963
snehala27 Jul 4, 2022
6937364
Updated Makefile with spectro changes
snehala27 Jul 5, 2022
beb6bd9
Validation disabled for AzureManagedControlPlane
snehala27 Jul 13, 2022
dc9ef12
windows support-added OSType to ammp and amcp
snehala27 Jul 14, 2022
a525b87
Updated the check for updating machinepool when using autoscalar (#35)
LochanRn Jul 1, 2022
d43fcdf
Suppress warning messages for ServicePrincipal auth
snehala27 Aug 29, 2022
991b637
Merge pull request #41 from spectrocloud/warningMessages
snehala27 Aug 29, 2022
9a1abce
Updated the check for updating machinepool when using autoscalar (#42)
LochanRn Sep 6, 2022
c7bc2cc
AKS static placement for cross RG
snehala27 Sep 8, 2022
083779c
Merge pull request #44 from spectrocloud/staticPlacement
snehala27 Sep 11, 2022
ba4fc3d
Fixed osType issue
snehala27 Sep 12, 2022
bd4d68a
Merge pull request #45 from spectrocloud/osTypeFix
snehala27 Sep 13, 2022
6d045f3
PCP-328 fix
jayesh-srivastava Sep 13, 2022
1049b2c
Merge pull request #46 from spectrocloud/PCP-328
sadysnaat Sep 13, 2022
dba7ef2
Fixed upgrade issue from v1alpha4 to v1beta1
snehala27 Sep 22, 2022
02c2d13
Merge pull request #47 from spectrocloud/osTypeUpgradeIssue
snehala27 Sep 22, 2022
5c7f372
AKS: enable isVnetManaged, add caching
jackfrancis Aug 10, 2022
2ec9a65
Merge pull request #48 from spectrocloud/PCP-402
snehala27 Sep 22, 2022
17fcbfc
updated computediff authorized ip range logic for nil check
LochanRn Sep 23, 2022
a9d5c3e
Merge pull request #49 from spectrocloud/update-azure-computeDiff-aut…
snehala27 Sep 24, 2022
8ef8b4a
Added subnetName spec to azure machine pool. (#50)
LochanRn Oct 4, 2022
c47c27d
Use same subnet for cp and workers
snehala27 Nov 2, 2022
cb37831
Merge pull request #51 from spectrocloud/subnetChange
jzhoucliqr Nov 8, 2022
4d320a9
private cluster change
akhilesh2410 Nov 24, 2022
477542f
cleanup
akhilesh2410 Nov 25, 2022
4d3fa1b
make file
akhilesh2410 Nov 25, 2022
6a7d5db
Merge pull request #53 from spectrocloud/az-pvt-cluster-v1beta1
akhilesh2410 Nov 25, 2022
c91b70d
new crds
sadysnaat Nov 26, 2022
fc47794
Merge pull request #54 from spectrocloud/spv1b1-make-manifests
sadysnaat Nov 26, 2022
5b6bbc9
add check for frontend ip
akhilesh2410 Nov 28, 2022
73e8bfc
Merge pull request #55 from spectrocloud/capz-crashloop
sadysnaat Nov 28, 2022
640dd8e
PEM-484: palette changes to input privatednszone
akhilesh2410 Nov 28, 2022
cd88083
Merge pull request #56 from spectrocloud/custom-private-dns
akhilesh2410 Nov 28, 2022
3fd8ef1
more nil checks
sadysnaat Nov 29, 2022
e174277
Revert "PEM-483: palette changes to input privatednszone"
sadysnaat Nov 29, 2022
3ff3260
Merge pull request #57 from spectrocloud/revert-56-custom-private-dns
sadysnaat Nov 29, 2022
5dadec5
Merge pull request #58 from spectrocloud/PCP-606-azure-cluster-creati…
sadysnaat Nov 29, 2022
4617a99
Revert "Revert "PEM-483: palette changes to input privatednszone""
akhilesh2410 Nov 30, 2022
cf96039
fix private dns issue
akhilesh2410 Nov 30, 2022
7e8c3fa
Merge pull request #59 from spectrocloud/pvt-dns
akhilesh2410 Nov 30, 2022
6a0f49e
Resolved NIC deletion issue
snehala27 Dec 28, 2022
fdfbd24
Merge branch 'spectro-v1beta1' into nicDeletionIssue
snehala27 Dec 28, 2022
f41cf66
Merge pull request #61 from spectrocloud/nicDeletionIssue
snehala27 Dec 29, 2022
f77b61e
enforce lowercase providerID RG to match cloud-provider-azure
jackfrancis Aug 5, 2022
d467b2c
Merge pull request #62 from spectrocloud/providerIDIssue
snehala27 Feb 2, 2023
7c12f46
Bumped versions to resolve security issues
snehala27 Mar 1, 2023
35b9b4d
Merge pull request #63 from spectrocloud/sec-vulnerabilities
snehala27 Mar 3, 2023
6ff059f
Update go in Dockerfile
jayesh-srivastava Apr 25, 2023
dec8662
Merge pull request #65 from spectrocloud/PSS-2845-rel-3.4
jayesh-srivastava Apr 25, 2023
83ad3fb
PSS-2845: Update go
jayesh-srivastava Apr 28, 2023
2c70a18
Merge pull request #67 from spectrocloud/PSS-2845-rel-3.4
jayesh-srivastava Apr 28, 2023
0ab3bf1
Ignore error for other future types in delete functionality
snehala27 Apr 28, 2023
7f95915
Merge pull request #68 from spectrocloud/PCP-1155
snehala27 May 5, 2023
9768006
Spectro FIPS and CICD
zulfilee Jun 10, 2023
5414508
Merge pull request #71 from spectrocloud/fips-cicd
zulfilee Jun 11, 2023
8158669
adding UserAssignedIdentities to AzureManagedControlPlane
luthermonson Jun 16, 2023
410ecb1
Merge pull request #73 from luthermonson/mc-update-v1b1
luthermonson Jun 16, 2023
d045c51
adding OutboundType to AzureManagedControlPlane
luthermonson Jun 16, 2023
0b74b48
Merge pull request #74 from luthermonson/outboundtype-v1b1
luthermonson Jun 16, 2023
b335198
Fips changes minor
zulfilee Jul 1, 2023
460b6e8
fix for add-on profile upgrade
LochanRn Jul 4, 2023
23c4d85
update removal flow
LochanRn Jul 5, 2023
f3470d4
Fix CodeSmell
vishu2498 Jul 5, 2023
d9501b9
Merge pull request #77 from spectrocloud/PCP-1418
sadysnaat Jul 5, 2023
ea2402d
PCP-1467: UserAssignedIdentities Fix
vishu2498 Jul 12, 2023
40324fe
PCP-1467: PR Comments Resolution I
vishu2498 Jul 13, 2023
aef2bc5
Merge pull request #79 from spectrocloud/PCP-1467
vishu2498 Jul 13, 2023
c140ad0
PCP-1567: AKS ServiceCIDR Fix (#81)
vishu2498 Jul 25, 2023
3996ff5
PCP-1595 and PCP-1596 fix (#83)
LochanRn Aug 2, 2023
bb7c144
fix webhook issue (#85)
LochanRn Aug 2, 2023
7792253
PEM-2613: Fix Cipher Suit issue
jayesh-srivastava Aug 3, 2023
13907ce
Update
jayesh-srivastava Aug 4, 2023
39bb917
Merge pull request #88 from spectrocloud/PEM-2613
sadysnaat Aug 9, 2023
8ed1d11
AKS UpgradeChannels (#92)
LochanRn Sep 8, 2023
b6cce35
disableLocal accounts (#91)
LochanRn Sep 8, 2023
5a53d64
ensure to not downgrade an auto-upgraded cluster (#95)
LochanRn Sep 27, 2023
5e16775
Cherry pick PCP-1614 PCP-1615 (#96) (#98)
LochanRn Oct 3, 2023
b97d616
OPS-2199 Enable ARM and Golang Alpine support
zulfilee Oct 3, 2023
9623c63
Merge pull request #99 from spectrocloud/ops-2199
zulfilee Oct 3, 2023
107fb1a
Fix GO build
zulfilee Oct 3, 2023
162f3e4
Add Platform to Dockerfile
zulfilee Oct 4, 2023
0d9676d
Add Platform to Dockerfile
zulfilee Oct 4, 2023
eac5a2a
Add Platform to Dockerfile
zulfilee Oct 4, 2023
bb6e07e
Add Remote Builder for ARM
zulfilee Oct 5, 2023
bbb83eb
Merge pull request #100 from spectrocloud/arm-remote-build
zulfilee Oct 5, 2023
8c431f2
Add Remote Builder for ARM
zulfilee Oct 5, 2023
bf01464
Add Remote Builder for ARM
zulfilee Oct 5, 2023
0cc43fe
Add Remote Builder for ARM
zulfilee Oct 5, 2023
5292f6f
Update spectro-release.yaml
zulfilee Oct 9, 2023
8682101
Update spectro-release.yaml
zulfilee Oct 9, 2023
967487b
Update Dockerfile
zulfilee Oct 9, 2023
64d9eab
Update spectro-release.yaml
zulfilee Oct 9, 2023
9f81622
PCP-2009 : Add PR validations for CAPZ
kedar-calsoftinc Oct 19, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .gitattributes
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
# Specify generated cluster templates as generated files
**/cluster-template-*.yaml linguist-generated
**/cluster-template-*.yaml linguist-generated
36 changes: 36 additions & 0 deletions .github/workflows/bulwark-gitleaks-pr-validation.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
name: BulwarkGitLeaks
on: [pull_request]

concurrency:
group: gitleaks-${{ github.ref }}
cancel-in-progress: true

jobs:
gitleaks-pr-scan:
runs-on: ubuntu-latest
container:
image: gcr.io/spectro-dev-public/bulwark/gitleaks:latest
env:
REPO: ${{ github.event.repository.name }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
GITLEAKS_CONFIG: /workspace/config.toml
steps:

- name: run-bulwark-gitleaks-scan
shell: sh
env:
BRANCH: ${{ github.head_ref || github.ref_name }}
run: /workspace/bulwark -name CodeSASTGitLeaks -target $REPO -tags "branch:$BRANCH,options:--log-opts origin..HEAD"

- name: check-result
shell: sh
run: |
resultPath=./$REPO/gitleaks.json
cat $resultPath | grep -v \"Match\"\: | grep -v \"Secret\"\:
total_failed_tests=`cat $resultPath | grep \"Fingerprint\"\: | wc -l`
if [ "$total_failed_tests" -gt 0 ]; then
echo "GitLeaks validation check failed with above findings..."
exit 1
else
echo "GitLeaks validation check passed"
fi
35 changes: 35 additions & 0 deletions .github/workflows/bulwark-gosec-pr-scan.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
name: BulwarkGoSec
on: [pull_request]

concurrency:
group: gosec-${{ github.ref }}
cancel-in-progress: true

jobs:
gosec-pr-scan:
runs-on: ubuntu-latest
container:
image: gcr.io/spectro-dev-public/bulwark/gosec:latest
steps:

- name: run-gosec-scan
shell: sh
env:
BRANCH: ${{ github.head_ref || github.ref_name }}
GO111MODULE: on
run: |
/workspace/bulwark -name CodeSASTGoSec -verbose -target $REPO -tags "branch:$BRANCH,rules:all"

- name: check-result
shell: sh
run: |
resultPath=$REPO-result.json
issues=$(cat $resultPath | jq -r '.Stats.found')
echo "Found ${issues} issues"
if [ "$issues" -gt 0 ]; then
echo "GoSec SAST scan failed with below findings..."
cat $resultPath
exit 1
else
echo "GoSec SAST scan passed"
fi
31 changes: 31 additions & 0 deletions .github/workflows/golicense-pr-validation.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
name: GoLicenses
on: [pull_request]

concurrency:
group: golicenses-${{ github.ref }}
cancel-in-progress: true

jobs:
golicense-pr-scan:
runs-on: ubuntu-latest
steps:
- name: install-git
run: sudo apt-get install -y git

- name: install-golicenses
run: GOBIN=/usr/local/bin go install github.com/google/go-licenses@latest

- name: checkout
uses: actions/checkout@v3

- name: set-github-access
run: |
/usr/bin/git config --global --add url."https://${{ secrets.GH_TOKEN }}:x-oauth-basic@github".insteadOf ssh://git@github
/usr/bin/git config --global --add url."https://${{ secrets.GH_TOKEN }}:x-oauth-basic@github".insteadOf https://github
/usr/bin/git config --global --add url."https://${{ secrets.GH_TOKEN }}:x-oauth-basic@github".insteadOf git@github

- name: golicense-scan
run: |
go-licenses check --ignore github.com/spectrocloud ./
# go-licenses check --ignore github.com/spectrocloud ./hack/tools
# go-licenses check --ignore github.com/spectrocloud ./spate/xk6-spate
33 changes: 33 additions & 0 deletions .github/workflows/govulncheck-pr-validation.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
name: GoVulnCheck
on: [pull_request]

concurrency:
group: govulncheck-${{ github.ref }}
cancel-in-progress: true

jobs:
govulncheck-pr-scan:
runs-on: ubuntu-latest
container:
image: gcr.io/spectro-images-public/golang:alpine
steps:
- name: install-govulncheck
run: GOBIN=/usr/local/bin go install golang.org/x/vuln/cmd/govulncheck@latest

- name: checkout
uses: actions/checkout@v3

- name: set-github-access
run: |
/usr/bin/git config --global --add url."https://${{ secrets.GH_TOKEN }}:x-oauth-basic@github".insteadOf ssh://git@github
/usr/bin/git config --global --add url."https://${{ secrets.GH_TOKEN }}:x-oauth-basic@github".insteadOf https://github
/usr/bin/git config --global --add url."https://${{ secrets.GH_TOKEN }}:x-oauth-basic@github".insteadOf git@github

- name: govulncheck-scan
run: |
go version
govulncheck -mode source ./
govulncheck -mode source ./hack/tools



90 changes: 90 additions & 0 deletions .github/workflows/spectro-release.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
name: Spectro Release
run-name: Release for Cluster API Azure ${{ github.event.inputs.release_version }}
on:
workflow_dispatch:
inputs:
release_version:
description: 'Cluster API Version to Build'
required: true
default: '0.0.0'
rel_type:
type: choice
description: Type of release
options:
- release
- rc
jobs:
builder:
# edge-runner machine group is a bunch of machines in US Datacenter
runs-on: ubuntu-latest
# Initialize all secrets required for the job
# Ensure that the credentials are provided as encrypted secrets
env:
SPECTRO_VERSION: ${{ github.event.inputs.release_version }}
LEGACY_REGISTRY: gcr.io/spectro-images-public/release/cluster-api-azure
FIPS_REGISTRY: gcr.io/spectro-images-public/release-fips/cluster-api-azure
steps:
-
uses: mukunku/[email protected]
id: checkTag
with:
tag: v${{ github.event.inputs.release_version }}-spectro
-
if: ${{ steps.checkTag.outputs.exists == 'true' }}
run: |
echo "Tag already exists for v${{ github.event.inputs.release_version }}-spectro..."
exit 1
-
if: ${{ github.event.inputs.rel_type == 'rc' }}
run: |
echo "LEGACY_REGISTRY=gcr.io/spectro-dev-public/release/cluster-api-azure" >> $GITHUB_ENV
echo "FIPS_REGISTRY=gcr.io/spectro-dev-public/release-fips/cluster-api-azure" >> $GITHUB_ENV
-
name: Install SSH key for remote docker build
uses: shimataro/ssh-key-action@v2
with:
key: ${{ secrets.SSH_KEY }}
known_hosts: ${{ secrets.KNOWN_HOSTS }}
if_key_exists: fail
-
uses: actions/checkout@v3
-
name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
-
name: Login to private registry
uses: docker/login-action@v1
with:
registry: ${{ secrets.REGISTRY_URL }}
username: ${{ secrets.REGISTRY_USERNAME }}
password: ${{ secrets.REGISTRY_PASSWORD }}
-
name: Build Image
env:
REGISTRY: ${{ env.LEGACY_REGISTRY }}
run: |
make docker-build-all
make docker-push-all
-
name: Build Image - FIPS Mode
env:
REGISTRY: ${{ env.FIPS_REGISTRY }}
FIPS_ENABLE: yes
ALL_ARCH: amd64
run: |
make docker-build-all
make docker-push-all
-
name: Create Release
if: ${{ github.event.inputs.rel_type == 'release' }}
id: create_release
uses: actions/create-release@v1
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
with:
tag_name: v${{ github.event.inputs.release_version }}-spectro
release_name: Release v${{ github.event.inputs.release_version }}-spectro
body: |
Release version v${{ github.event.inputs.release_version }}-spectro
draft: false
prerelease: false
46 changes: 32 additions & 14 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -1,5 +1,3 @@
# syntax=docker/dockerfile:1.4

# Copyright 2019 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
Expand All @@ -15,17 +13,26 @@
# limitations under the License.

# Build the manager binary
FROM golang:1.17 as builder
WORKDIR /workspace

ARG BUILDER_GOLANG_VERSION
# First stage: build the executable.
FROM --platform=$TARGETPLATFORM gcr.io/spectro-images-public/golang:${BUILDER_GOLANG_VERSION}-alpine as toolchain
# Run this with docker build --build_arg $(go env GOPROXY) to override the goproxy
ARG goproxy=https://proxy.golang.org
ENV GOPROXY=$goproxy

# FIPS
ARG CRYPTO_LIB
ENV GOEXPERIMENT=${CRYPTO_LIB:+boringcrypto}

FROM toolchain as builder
WORKDIR /workspace

RUN apk update
RUN apk add git gcc g++ curl binutils-gold

# Copy the Go Modules manifests
COPY go.mod go.mod
COPY go.sum go.sum

# Cache deps before building and copying source so that we don't need to re-download as much
# and so that source changes don't invalidate our downloaded layer
RUN --mount=type=cache,target=/go/pkg/mod \
Expand All @@ -34,22 +41,33 @@ RUN --mount=type=cache,target=/go/pkg/mod \
# Copy the sources
COPY ./ ./

# Build
ARG package=.
ARG ARCH

# Cache the go build into the the Go’s compiler cache folder so we take benefits of compiler caching across docker build calls
RUN --mount=type=cache,target=/root/.cache/go-build \
--mount=type=cache,target=/go/pkg/mod \
go build .
if [ ${CRYPTO_LIB} ]; \
then \
GOARCH=${ARCH} go-build-fips.sh . ;\
else \
GOARCH=${ARCH} go-build-static.sh . ;\
fi

# Build
ARG package=.
ARG ARCH
ARG ldflags

# Do not force rebuild of up-to-date packages (do not use -a) and use the compiler cache folder
RUN --mount=type=cache,target=/root/.cache/go-build \
--mount=type=cache,target=/go/pkg/mod \
CGO_ENABLED=0 GOOS=linux GOARCH=${ARCH} \
go build -ldflags "${ldflags} -extldflags '-static'" \
-o manager ${package}
if [ ${CRYPTO_LIB} ]; \
then \
GOARCH=${ARCH} go-build-fips.sh -a -o manager ${package};\
else \
GOARCH=${ARCH} go-build-static.sh -a -o manager ${package} ;\
fi
RUN if [ "${CRYPTO_LIB}" ]; then assert-static.sh manager; fi
RUN if [ "${CRYPTO_LIB}" ]; then assert-fips.sh manager; fi
RUN scan-govulncheck.sh manager

# Production image
FROM gcr.io/distroless/static:nonroot
Expand Down
30 changes: 23 additions & 7 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -15,13 +15,15 @@
# If you update this file, please follow
# https://suva.sh/posts/well-documented-makefiles


# Ensure Make is run with bash shell as some syntax below is bash-specific
SHELL:=/usr/bin/env bash

.DEFAULT_GOAL:=help

GOPATH := $(shell go env GOPATH)
GOARCH := $(shell go env GOARCH)
#GOARCH := $(shell go env GOARCH)
GOARCH := amd64
GOOS := $(shell go env GOOS)
GOPROXY := $(shell go env GOPROXY)
ifeq ($(GOPROXY),)
Expand Down Expand Up @@ -120,14 +122,28 @@ KUBE_APISERVER=$(TOOLS_BIN_DIR)/kube-apiserver
ETCD=$(TOOLS_BIN_DIR)/etcd

# Define Docker related variables. Releases should modify and double check these vars.
REGISTRY ?= gcr.io/$(shell gcloud config get-value project)
# Fips Flags
FIPS_ENABLE ?= ""
BUILDER_GOLANG_VERSION ?= 1.21
BUILD_ARGS = --build-arg CRYPTO_LIB=${FIPS_ENABLE} --build-arg BUILDER_GOLANG_VERSION=${BUILDER_GOLANG_VERSION}

RELEASE_LOC := release
ifeq ($(FIPS_ENABLE),yes)
RELEASE_LOC := release-fips
endif

SPECTRO_VERSION ?= 4.0.0-dev
TAG ?= v1.3.2-spectro-${SPECTRO_VERSION}
ARCH ?= amd64
# ALL_ARCH = amd64 arm arm64 ppc64le s390x
ALL_ARCH = arm64 amd64

REGISTRY ?= gcr.io/spectro-dev-public/$(USER)/${RELEASE_LOC}

STAGING_REGISTRY := gcr.io/k8s-staging-cluster-api-azure
PROD_REGISTRY := registry.k8s.io/cluster-api-azure
IMAGE_NAME ?= cluster-api-azure-controller
CONTROLLER_IMG ?= $(REGISTRY)/$(IMAGE_NAME)
TAG ?= dev
ARCH ?= $(GOARCH)
ALL_ARCH = amd64 arm arm64 ppc64le s390x

# Allow overriding manifest generation destination directory
MANIFEST_ROOT ?= config
Expand Down Expand Up @@ -339,8 +355,8 @@ docker-pull-prerequisites: ## Pull prerequisites for building controller-manager

.PHONY: docker-build
docker-build: docker-pull-prerequisites ## Build the docker image for controller-manager.
DOCKER_BUILDKIT=1 docker build --build-arg goproxy=$(GOPROXY) --build-arg ARCH=$(ARCH) --build-arg ldflags="$(LDFLAGS)" . -t $(CONTROLLER_IMG)-$(ARCH):$(TAG)
$(MAKE) set-manifest-image MANIFEST_IMG=$(CONTROLLER_IMG)-$(ARCH) MANIFEST_TAG=$(TAG) TARGET_RESOURCE="./config/default/manager_image_patch.yaml"
docker buildx build --load --platform linux/${ARCH} ${BUILD_ARGS} --build-arg goproxy=$(GOPROXY) --build-arg ARCH=$(ARCH) --build-arg ldflags="$(LDFLAGS)" . -t $(CONTROLLER_IMG)-$(ARCH):$(TAG)
$(MAKE) set-manifest-image MANIFEST_IMG=$(CONTROLLER_IMG) MANIFEST_TAG=$(TAG) TARGET_RESOURCE="./config/default/manager_image_patch.yaml"
$(MAKE) set-manifest-pull-policy TARGET_RESOURCE="./config/default/manager_pull_policy.yaml"

.PHONY: docker-push
Expand Down
Loading